Analysis
-
max time kernel
154s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 22:26
Static task
static1
Behavioral task
behavioral1
Sample
47ce2c5a05ac010d548c2e2a6ef339fc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
47ce2c5a05ac010d548c2e2a6ef339fc.exe
Resource
win10v2004-20240319-en
General
-
Target
47ce2c5a05ac010d548c2e2a6ef339fc.exe
-
Size
97KB
-
MD5
47ce2c5a05ac010d548c2e2a6ef339fc
-
SHA1
aeb98a5cc3009b64227fe21a544b8b374e4ca8df
-
SHA256
5fd78503adde5d002081e1a3ea6332745bf71c9d82d5d387555fe164360875ea
-
SHA512
7f5ab54c2442ccdc6d2063f8d63950d82a3ba3c4fe54a9c609f049e382b58a03acd529c7d98fc462f3dbc53da013e0900d6fbb16e0d8b78afb6c3fe93fc739a6
-
SSDEEP
768:urItKyw5WHXfQmjIiIk9ecAaSMb965yX7DLdP3Lii:ur3Z5IfQmv81aZKyXXZPbii
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3288 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation 47ce2c5a05ac010d548c2e2a6ef339fc.exe -
Executes dropped EXE 1 IoCs
pid Process 3640 zewhost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\zewhost.exe 47ce2c5a05ac010d548c2e2a6ef339fc.exe File opened for modification C:\Windows\Debug\zewhost.exe 47ce2c5a05ac010d548c2e2a6ef339fc.exe File opened for modification C:\Windows\Debug\zewhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2004 47ce2c5a05ac010d548c2e2a6ef339fc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2004 wrote to memory of 3288 2004 47ce2c5a05ac010d548c2e2a6ef339fc.exe 96 PID 2004 wrote to memory of 3288 2004 47ce2c5a05ac010d548c2e2a6ef339fc.exe 96 PID 2004 wrote to memory of 3288 2004 47ce2c5a05ac010d548c2e2a6ef339fc.exe 96 PID 2004 wrote to memory of 1584 2004 47ce2c5a05ac010d548c2e2a6ef339fc.exe 101 PID 2004 wrote to memory of 1584 2004 47ce2c5a05ac010d548c2e2a6ef339fc.exe 101 PID 2004 wrote to memory of 1584 2004 47ce2c5a05ac010d548c2e2a6ef339fc.exe 101 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3288 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\47ce2c5a05ac010d548c2e2a6ef339fc.exe"C:\Users\Admin\AppData\Local\Temp\47ce2c5a05ac010d548c2e2a6ef339fc.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\zewhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:3288
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\47CE2C~1.EXE > nul2⤵PID:1584
-
-
C:\Windows\Debug\zewhost.exeC:\Windows\Debug\zewhost.exe1⤵
- Executes dropped EXE
PID:3640
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2104 --field-trial-handle=2276,i,5672504106535478802,17394903851940863593,262144 --variations-seed-version /prefetch:81⤵PID:1376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5a36c453a4ffdbb46d22f7b463a4e6704
SHA1a042cf1b61b496baae3b486225856353160b45d5
SHA2566e4e021aad68802b63d917f5aaf0ab1360d63f366aa67c937236022d1b102bb6
SHA51249bf205b4c3312bff617749df0ff5fe3c97b67180439902beebe6a4224cd34f0e4c803f92e9b53e9957dcb7b6e8ed74275b2da1c3cbfcb98d071965a9d9e4ee8